First published: Mon Feb 27 2012(Updated: )
A stored cross-site scripting (XSS) flaw was found in the way Kadu, the instant messenger compatible with the Gadu-Gadu protocol, performed sanitization of status and sms messages for particular contact in user's history. A remote attacker could provide a specially-crafted status or sms message, which would be stored in victim's Kadu history file, if the attacker was present on the contact list of the victim and the victim has had storage of statuses enabled for their history file. When the victim later examined the content of the status history, this flaw could lead to arbitrary HTML or webscript execution. References: [1] <a href="https://bugzilla.novell.com/show_bug.cgi?id=749036">https://bugzilla.novell.com/show_bug.cgi?id=749036</a> Upstream patches: [2] <a href="https://gitorious.org/kadu/kadu/commit/ebe3674cf0f3aa9b36308c06e19cb293cc790b52">https://gitorious.org/kadu/kadu/commit/ebe3674cf0f3aa9b36308c06e19cb293cc790b52</a> (patch for the XSS issue) [3] <a href="https://gitorious.org/kadu/kadu/commit/e9506be6d3dcdd408fdf83d8eb82416c9b798c84">https://gitorious.org/kadu/kadu/commit/e9506be6d3dcdd408fdf83d8eb82416c9b798c84</a> (additional hardening) [4] <a href="https://gitorious.org/kadu/kadu/commit/91772e46541e22cbc2c7bf41a1a9798c2a58f6d6">https://gitorious.org/kadu/kadu/commit/91772e46541e22cbc2c7bf41a1a9798c2a58f6d6</a> (disable xhtmlrequests) [5] <a href="https://gitorious.org/kadu/kadu/commit/94e7479617d78a1649a0763960edade7ad09a0d0">https://gitorious.org/kadu/kadu/commit/94e7479617d78a1649a0763960edade7ad09a0d0</a> (allow only GET and HEADER requests, additional hardening)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Kadu Kadu | =0.9.0 | |
Kadu Kadu | =0.10.0 | |
Kadu Kadu | =0.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.